CPT 255 DR B’s Practice Final – Flashcards
Unlock all answers in this set
Unlock answersquestion
When you create Active Directory sites, which of the following is not a primary reason to conserve bandwidth?
answer
reduce encryption traffic
question
Which type of trust can be used to form a relationship with a UNIX Kerberos network?
answer
realm trust
question
Which tool is used to migrate objects within or between forests?
answer
ADMT
question
Which of the following statements best describes the most likely placement of a Read-Only Domain Controller (RODC)?
answer
An RODC is most likely to be placed in a remote site.
question
Which of the following should be defined in order to conserve bandwidth between sites within a single domain?
answer
A bridgehead server
question
Which firewall configuration is a single-point firewall that connects the internal network and the Internet?
answer
bastion host
question
Although the changes themselves are relatively simple, why is changing the AD Schema so important? (Choose two answers.)
answer
The changes could corrupt the database. The changes affect all objects for that object type.
question
Which feature or role must be installed in order to extend the Active Directory schema with UNIX attributes?
answer
Identity Management for UNIX
question
Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects zone status events from DNS servers?
answer
Every 30 minutes
question
Which utility is used to manage Active Directory from the command line?
answer
Ntdsutil
question
Which forest model would is based on the resources that the users and groups will access?
answer
Resource forest model.
question
Which type of connectivity does DirectAccess establish between workstation and server?
answer
bi-directional
question
Which replication model uses the central office as the main site that updates all remote sites?
answer
A hub and spoke topology
question
Which VPN tunneling protocol uses IPSec with 3DES for data confidentiality?
answer
L2TP/IPSec
question
Before you perform any upgrade procedure, you should perform which of the following steps?
answer
You should backup the entire system.
question
Which form of authentication is used by SSTP?
answer
Digital certificates
question
Which of the following is a distributed file system protocol used to access files over the network that was originally created for UNIX and Linux file server clients?
answer
NFS
question
Which of the following terms best describes the special resource record that Windows Server 2012 R2 DHCP will create to track which machine originally requested a specific name in DNS?
answer
Dynamic Host Configuration Identifier
question
Which of the following terms best describes the high-availability technology that establishes multiple sessions or connections to the Fibre Channel storage array by using redundant path components such as switches, adapters, and cables?
answer
Multipath I/O
question
Once all IPAM server setup tasks are complete, several scheduled tasks run on the IPAM server. How often does the process run that collects IP address space usage data from DHCP servers?
answer
Every 2 hours
question
What is the purpose of DNS Cache Locking?
answer
It prevents an attacker from replacing records in the resolver cache while the Time to Live (TTL) is still in force.
question
Which type of Active Directory domain controller is recommended to minimize security risks for remediation servers?
answer
read-only
question
Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multi-master domain controllers can operate and synchronize properly?
answer
Operations Masters
question
When a user changes his or her password, to which domain controller is the password change notification sent?
answer
The PDC Emulator
question
In Window Server 2012 R2 IPAM, what is the second-highest-level entity within the IP address space?
answer
IP address range
question
Which of the following terms best describes an area of an AD DS network in which all domain controllers are well connected with fast and reliable network links?
answer
site
question
Regarding DNSSEC, which of the following terms describes the new records created once a zone is signed?
answer
DNSSEC resource records
question
Using File and Storage Services in Server Manager, you will create a new share. The New Share Wizard prompts you for a profile. You need a profile that provides basic NFS sharing with authentication and permissions with the least administrative effort. Which of the following should be selected?
answer
NFS Share-Quick
question
Your company has started to develop several products for the military. Because of the security necessary for these products, you need to keep your environment isolated. Which of the following actions should you perform?
answer
Create a separate forest
question
When a file is accessed using NFS, which attributes are used by the NFS server to determine if the user has the required permissions to access the file?
answer
UID and GID
question
IPv6 addresses are written using which of the following number systems?
answer
Hexidecimal
question
You are ready to use the lite touch deployment for Windows Server 2012 R2 and WDS. You have approximately 200 servers running Windows Server 2008 R2 and 100 servers running Windows Server 2012. You need to look at all servers and determine which servers can be upgraded to Windows Server 2012 R2. How should you analyze your computers?
answer
Run the Microsoft Assessment and Planning (MAP) Toolkit
question
Which of the following terms best defines a chain of site links by which domain controllers from different sites can communicate?
answer
site-link bridge
question
Which of the following DNS zones are replicated to all domain controllers within the forest?
answer
forestDNS zones application partition
question
How can you go about obtaining Windows PE 4.0 for usage in your organization?
answer
Download the Windows 8 Assessment and Deployment Kit
question
The ISTG automatically assigns one server in each site as the bridgehead server unless you override this by establishing a list of __________ bridgehead servers.
answer
preferred
question
For users to receive GPO settings, they must have which two permissions to the GPO
answer
Allow Read & Allow Apply Group Policy
question
Which feature allows you to deploy additional virtual machines to a tier when the load of the tier increases?
answer
scale-out
question
Which database engine is used for the DHCP database in Windows Server 2012 R2?
answer
Jet
question
Which of the following is a disadvantage of a centralized DHCP infrastructure?
answer
increased burden on the servers
question
By default, which database is used with IPAM?
answer
Windows Internal Database
question
You want to deploy IPAM in an Active Directory Forest. Which topology should you use when you want a single IPAM server for the entire forest?
answer
Centralized
question
When enabling NAP for DHCP scopes, how should you roll out the service?
answer
for individual DHCP scopes
question
When configuring DHCP failover partners, the time synchronization between the partners is critical. What is the maximum allowable time skew between DHCP failover partners?
answer
60 seconds
question
Which migration path is a two-phase process in which you first upgrade an existing forest and domain and then organize the AD objects as needed?
answer
upgrade-then-restructure migration
question
Which of the following is the minimum domain functional level needed to support domain renaming?
answer
Windows Server 2003
question
Which command-line tool allows you to create and display an RSoP query from the command line?
answer
GPResult
question
In Hyper-V, which of the following terms best describes the process used to convert a physical computer to virtual server?
answer
P2V
question
Which type of key is needed with Active Directory-Based Activation?
answer
GVLK key
question
When deploying a computer, which images deploy the quickest?
answer
Thick images
question
You have a reference computer on which you just installed Windows and all of the necessary applications. You then configured Windows. You are now ready to capture the system. Which of the following statements describes the next step you should take?
answer
You need to run sysprep.
question
If you don't want a GPO to apply, which Group Policy permission is applied to a user or group?
answer
Deny Apply Group Policy
question
Which storage space resiliency type can be used to protect up to a single drive failure and requires a minimum of three drives?
answer
Parity
question
Which of the following is the underlying network protocol used by iSCSI storage network?
answer
IP
question
Network Access Protection (NAP) is Microsoft's software for controlling network access of computers based on which of the following?
answer
a computer's overall health
question
Members of which IPAM security group have the ability to view information in IPAM and can perform server management tasks?
answer
IPAM MSM Administrators
question
By default, the DHCP Server service in Windows Server 2012 R2 uses dynamic allocation, leasing IP addresses to clients for how many days?
answer
6 days
question
The Run the Remote Access Setup Wizard divides the installation into four separate installations that give you a great deal of control over settings and configurations. Which of the following is the correct description for the installation of Application Servers?
answer
Configure your end-to-end authentication and security for the DirectAccess components. It also provides secure connections to individual servers.
question
Which of the following terms best describes the period necessary for a change to replicate to all domain controllers?
answer
The latency period
question
Which site link object is used when all sites are connecting using WAN links running at the same speed and with the same available bandwidth?
answer
DEFAULTIPSITELINK
question
Which of the following is not a business requirement that you should consider when designing an Active Directory infrastructure?
answer
International treaties
question
Regarding DNSSEC, against which of the following will DNS clients verify digital signatures returned alongside a requested resource record?
answer
Trust Anchor
question
Which of the following is used to allow storage providers to develop multipath solutions for their devices or optimize connectivity with the storage arrays?
answer
Device-specific module
question
Which PowerShell cmdlet creates the IPAM provisioning GPOs?
answer
Invoke-IpamGpoProvisioning
question
What is the most basic requirement for a DirectAccess implementation?
answer
The DirectAccess server must be part of an Active Directory domain.
question
An install image contains the operating system that WDS will install on the client computer. Which file from the Windows Server 2012 R2 installation DVD is used to install the operating system?
answer
install.wim
question
Which of the following can be used to simplify the deploying of VMs using VMM service templates by breaking the service templates into smaller, more manageable pieces?
answer
tiers
question
Which of the following terms best describes the amount of time that it takes for all domain controllers in the environment to contain the most up-to-date information?
answer
convergence
question
Which of the following tasks can be performed when you right-click on a DHCP-issued IP address in the IP Address Inventory section of the IPAM console? (Choose all that apply.)
answer
Delete DHCP reservation Delete DNS host record Create DHCP reservation
question
Which of the following networks represents the multicast network space, as defined in a default classful network?
answer
224.0.0.0 to 239.255.255.255
question
Which value represents the default size of the DNS socket pool?
answer
2,500
question
By using the Active Directory-integrated zone, DNS follows which of the following types of models?
answer
A multi-master model
question
Which protocol transmits a Neighbor Solicitation message to determine whether any other computer on the link is using the same IPv6 address?
answer
IPv6 Neighbor Discovery
question
Which of the following components must a NAP client have enabled in order to use NAP? (Choose all that apply.)
answer
Security Center NAP Agent
question
Which of the following is used to maximize the consistency of permissions on privileged users and groups?
answer
AdminSDHolder
question
IPv4 addresses use an address space that is _____ bits long; IPv6 addresses use an address space that is _____ bits long.
answer
32, 128
question
Which of the following represents the physical connection between remote sites?
answer
site-link object
question
Which of the following terms best describes the primary advantage to enabling round-robin DNS?
answer
load balancing
question
Which of the following criteria can be used to create conditions in a DHCP policy? (Choose all that apply.)
answer
Client identifier User Class Vendor Class MAC address
question
Which of the following terms describes the first domain in the forest?
answer
Forest root domain
question
After a DNS zone has been secured with DNSSEC, what additional data will be returned to a client as a result of a query?
answer
Digital signatures for the returned records will be returned.
question
Which of the following can be used to add SPNs to an account?
answer
setspn
question
Which of the following can be imported into IPAM using the IPAM console?
answer
All of the above
question
During the process of calculating intra-site replication partners, which value best represents the maximum number of hops that the Knowledge Consistency Checker will allow between domain controllers?
answer
3
question
To create an NFS shared folder on a cluster, you must install which of the following items on each cluster node?
answer
All of the above
question
In addition to meeting operating system requirements, a DirectAccess client must be a member of which of the following?
answer
an AD domain
question
Which of the following allows you to create an active-active failover cluster where all file shares are online at the same time?
answer
SMB 3.0
question
How many global catalogs are recommended for every organization?
answer
at least two
question
Which of the following categories will you not find in the Monitor and Manage section of the IPAM console?
answer
DNS Zone Records
question
Which type of trust can be used to optimize the authentication process to resources in l forests with many domains?
answer
Shortcut trust
question
Which feature introduced in Windows Server 2012 R2 allows you to use SSD and standard hard drive storage with the same storage pool while storing more frequently access data on the SSD media?
answer
Storage tiers
question
How many Primary Domain Controller Emulators are required in a domain?
answer
one
question
Which of the following strategies can be deployed in an effort to avoid placing a domain controller at every site?
answer
Ensure that you have large bandwidth between the site and the central office.
question
Before designing your forests and domains, you must collect information for the following except the ___________?
answer
version of Microsoft Office
question
Which component is needed for the Zero-Touch, High-Volume Deployment strategy?
answer
System Center 2012 R2 Configuration Manager
question
Where should the schema master be placed?
answer
The forest root
question
Which of the following programs can be used to manage your sites?
answer
Active Directory Sites and Services
question
Group Policy __________ is used to simulate the effect of a policy on the user environment.
answer
Modeling
question
Unlike traditional VPN connections, DirectAccess connections are established automatically and provide which kind of connectivity?
answer
always on and seamless
question
Which DNS record contains the serial number for the zone?
answer
SOA record